Describes how malicious code can get on your company

Assignment Help Computer Network Security
Reference no: EM13947433

I have answered the questions; however, I am uncertain if I am on the right track. Can you please let me know with some explanation if your answers are different?

1. Which best describes how malicious code can get on your computer?

a. Email attachments

b. Downloaded software from non-authoritative sources and websites

c. Sharing diskettes from computers without up to date antivirus software

d. All of the above

e. A and C only

My guess is "all of the above".

2. A way of verifying a message's integrity after transport across a network is through the use of:

a. A Message Authentication Code

b. Steganography

c. An encryption key

d. A cipher

My Guess is an encryption key as this appears to be the safest way to transmit a message.

3. Which of the following best describes examples of mobile code?

a. Java, Javascript, and ActiveX

b. HTML, the language of web pages

c. Postscript, the language of some LaserJet printers

d. All of the above

e. None of the above

My guess is (A) as HTML is for web pages and (C) I have no idea what it is used for.

4. Which statement best describes the advantages of public key encryption?

a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages

b. Knowledge of one's public key does not yield knowledge of their private key

c. Encryption performance is faster than secret-key encryption

d. A and B only

e. None of the above

My guess is (A) is this correct..for some reason it doesn't look right.

5. Which statement best captures the advantage of secret key encryption?

a. It allows for faster encryption speeds than public key encryption

b. It only requires one key to be distributed for encryption and decryption

c. The keys are stronger than public keys and are more difficult to break

d. All of the above

e. A and B only.

My guess is (a).

6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?

a. The MBR record, the FAT record, and the Directory Table entry.

b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.

c. The FAT record and the Directory Table entry.

d. The FAT record, the Directory Table Entry, and the Partition Table.

My guess is (b).

Reference no: EM13947433

Questions Cloud

Determine which will be the independent variable : Choose 1 independent and 1 dependent variable from the following: variables - education level, smoking status, exercise, gender, marital status, age, weight, serum cholesterol, systolic blood pressure, sodium intake, IQ. WRITE A 100 - 200 word sta..
Certain about the direction of price change : You are positive that the XYZ stock price will change a lot in the near future. But you are not certain about the direction of price change. Which strategy is the best to use in this scenario?
Forward hedge or a money market hedge : Alpha Company, U.S.-based manufacturer of industrial equipment, just purchased a Korean company that produces plastic nuts and bolts for heavy equipment. Alpha's weighted average cost of capital is 10%. Given this information, determine whether a for..
New issue of preferred stock it calls : E-Eyes.com has a new issue of preferred stock it calls 20/20 preferred. The stock will pay a $20 dividend per year, but the first dividend will not be paid until 20 years from today. If you require a 9.25 percent return on this stock, how much should..
Describes how malicious code can get on your company : Which statement best describes the advantages of public key encryption?
Evidence plays a critical role in auditing : Evidence plays a critical role in auditing. Without quality evidence, auditors cannot arrive at the right conclusions about audit objectives. Evidence can be considered strong if it is persuasive. Persuasiveness, in turn, can be achieved if the ev..
What growth rate is expected for the company stock price : The stock price of Jenkins Co. is $53.90. Investors require a 13 percent rate of return on similar stocks. If the company plans to pay a dividend of $3.60 next year, what growth rate is expected for the company’s stock price?
Uniform heat generation within the shells : If there is uniform heat generation within the shells, obtain expressions for the steady-state, one-dimensional radial distributions of the temperature, heat flux, and heat rate. Contrast your results with those summarized in Appendix C.
Create a probability distribution for the number of bedrooms : Use the normal distribution to estimate the number of homes 18 or more miles but less than 22 miles from the center of the city. Compare this to the actual results. Does the normal distribution yield a good approximation of the actual results?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd